Movatterモバイル変換


[0]ホーム

URL:


US20240187378A1 - Techniques for applying a named port security policy - Google Patents

Techniques for applying a named port security policy
Download PDF

Info

Publication number
US20240187378A1
US20240187378A1US18/099,710US202318099710AUS2024187378A1US 20240187378 A1US20240187378 A1US 20240187378A1US 202318099710 AUS202318099710 AUS 202318099710AUS 2024187378 A1US2024187378 A1US 2024187378A1
Authority
US
United States
Prior art keywords
pod
port number
destination
port
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US18/099,710
Other versions
US12445413B2 (en
Inventor
Xie Zheng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VMware LLC
Original Assignee
VMware LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VMware LLCfiledCriticalVMware LLC
Assigned to VMWARE, INC.reassignmentVMWARE, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ZHENG, Xie
Assigned to VMware LLCreassignmentVMware LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: VMWARE, INC.
Publication of US20240187378A1publicationCriticalpatent/US20240187378A1/en
Application grantedgrantedCritical
Publication of US12445413B2publicationCriticalpatent/US12445413B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

The disclosure provides an example method for implementing a network policy in a software defined networking environment. The method generally includes receiving a manifest defining a plurality of pods, wherein: for a first pod, the manifest defines a first environment value, a first port number for a first container of the first pod, and a name for the first port number; for a second pod, the manifest defines the first environment value, a second port number for a second container of the second pod, and the name for the second port number; and the manifest defines a security policy applied to a third pod which defines a first egress policy indicating the first environment value and the name; and creating, based on the manifest indicating different port numbers, but the same name, for the different containers of the different pods, separate egress firewall rules for the first and second pods.

Description

Claims (20)

We claim:
1. A method for implementing a network policy in a software defined networking (SDN) environment, comprising:
receiving a manifest defining a plurality of pods in a namespace, wherein:
for a first pod, the manifest defines a first environment value for an environment of the first pod, a first port number for a first container of the first pod, and a name for the first port number defined for the first container of the first pod;
for a second pod, the manifest defines the first environment value for an environment of the second pod, a second port number for a second container of the second pod, and the name for the second port number defined for the second container of the second pod; and
the manifest defines a security policy applied to a third pod, the security policy defining a first egress policy indicating the first environment value and the name;
creating, based on the manifest indicating that the first port number is different than the second port number and that the first port number and the second port number share the name, separate egress firewall rules for the first pod and the second pod, the separate egress firewall rules comprising:
a first egress firewall rule to apply to packets with the third pod as a source, the first pod as a destination, and the first port number as a destination port; and
a second egress firewall rule to apply to packets with the third pod as a source, the second pod as a destination, and the second port number as a destination port; and
configuring a firewall with the first egress firewall rule and the second egress firewall rule.
2. The method ofclaim 1, wherein:
for a fourth pod, the manifest defines the first environment value for an environment of the fourth pod, the first port number for a fourth container of the fourth pod, and the name for the first port number defined for the fourth container of the fourth pod; and
the first egress firewall rule is further defined to apply to packets with the fourth pod as a destination.
3. The method ofclaim 1, wherein configuring the firewall comprises configuring a virtual switch in a communication path of at least one of the first pod, the second pod, or the third pod.
4. The method ofclaim 1, wherein:
for the third pod, the manifest defines a second environment value for an environment of the third pod, the second port number for a third container of the third pod, and the name for the second port number defined for the third container of the third pod;
the security policy defines a first ingress policy indicating the first environment value and the name, and further comprising:
creating, based on the first ingress policy, a first ingress firewall rule to apply to packets with the first pod as a source, the third pod as a destination, and the second port number as a destination port, wherein the first ingress firewall rule is further configured to apply to packets with the second pod as a source, the third pod as a destination, and the second port number as a destination port.
5. The method ofclaim 4, wherein the security policy is further applied to a fourth pod, wherein, for the fourth pod, the manifest defines the second environment value for the environment of the fourth pod, a third port number for a fourth container of the fourth pod, and the name for the third port number defined for the fourth container of the fourth pod, and further comprising:
creating, based on the first ingress policy, a second ingress firewall rule to apply to packets with the first pod as a source, the fourth pod as a destination, and the third port number as a destination port, wherein the second ingress firewall rule is further configured to apply to packets with the second pod as a source, the fourth pod as a destination, and the third port number as a destination port.
6. The method ofclaim 1, wherein the first pod is running in a first virtual machine.
7. The method ofclaim 1, wherein configuring the firewall comprises configuring a virtual network interface card in a communication path of at least one of the first pod, the second pod, or the third pod.
8. A system comprising:
one or more processors; and
at least one memory, the one or more processors and the at least one memory configured to:
receive a manifest defining a plurality of pods in a namespace, wherein:
for a first pod, the manifest defines a first environment value for an environment of the first pod, a first port number for a first container of the first pod, and a name for the first port number defined for the first container of the first pod;
for a second pod, the manifest defines the first environment value for an environment of the second pod, a second port number for a second container of the second pod, and the name for the second port number defined for the second container of the second pod; and
the manifest defines a security policy applied to a third pod, the security policy defining a first egress policy indicating the first environment value and the name;
create, based on the manifest indicating that the first port number is different than the second port number and that the first port number and the second port number share the name, separate egress firewall rules for the first pod and the second pod, the separate egress firewall rules comprising:
a first egress firewall rule to apply to packets with the third pod as a source, the first pod as a destination, and the first port number as a destination port; and
a second egress firewall rule to apply to packets with the third pod as a source, the second pod as a destination, and the second port number as a destination port; and
configure a firewall with the first egress firewall rule and the second egress firewall rule.
9. The system ofclaim 8, wherein:
for a fourth pod, the manifest defines the first environment value for an environment of the fourth pod, the first port number for a fourth container of the fourth pod, and the name for the first port number defined for the fourth container of the fourth pod; and
the first egress firewall rule is further defined to apply to packets with the fourth pod as a destination.
10. The system ofclaim 8, wherein to configure the firewall comprises to configure a virtual switch in a communication path of at least one of the first pod, the second pod, or the third pod.
11. The system ofclaim 8, wherein:
for the third pod, the manifest defines a second environment value for an environment of the third pod, the second port number for a third container of the third pod, and the name for the second port number defined for the third container of the third pod;
the security policy defines a first ingress policy indicating the first environment value and the name, and the one or more processors and the at least one memory are further configured to:
create, based on the first ingress policy, a first ingress firewall rule to apply to packets with the first pod as a source, the third pod as a destination, and the second port number as a destination port, wherein the first ingress firewall rule is further configured to apply to packets with the second pod as a source, the third pod as a destination, and the second port number as a destination port.
12. The system ofclaim 11, wherein the security policy is further applied to a fourth pod, wherein, for the fourth pod, the manifest defines the second environment value for the environment of the fourth pod, a third port number for a fourth container of the fourth pod, and the name for the third port number defined for the fourth container of the fourth pod, and the one or more processors and the at least one memory are further configured to:
create, based on the first ingress policy, a second ingress firewall rule to apply to packets with the first pod as a source, the fourth pod as a destination, and the third port number as a destination port, wherein the second ingress firewall rule is further configured to apply to packets with the second pod as a source, the fourth pod as a destination, and the third port number as a destination port.
13. The system ofclaim 8, wherein the first pod is running in a first virtual machine.
14. The system ofclaim 8, wherein to configure the firewall comprises to configure a virtual network interface card in a communication path of at least one of the first pod, the second pod, or the third pod.
15. A non-transitory computer-readable medium comprising instructions that, when executed by one or more processors of a computing system, cause the computing system to perform operations for implementing a network policy in a software defined networking (SDN) environment, the operations comprising:
receiving a manifest defining a plurality of pods in a namespace, wherein:
for a first pod, the manifest defines a first environment value for an environment of the first pod, a first port number for a first container of the first pod, and a name for the first port number defined for the first container of the first pod;
for a second pod, the manifest defines the first environment value for an environment of the second pod, a second port number for a second container of the second pod, and the name for the second port number defined for the second container of the second pod; and
the manifest defines a security policy applied to a third pod, the security policy defining a first egress policy indicating the first environment value and the name;
creating, based on the manifest indicating that the first port number is different than the second port number and that the first port number and the second port number share the name, separate egress firewall rules for the first pod and the second pod, the separate egress firewall rules comprising:
a first egress firewall rule to apply to packets with the third pod as a source, the first pod as a destination, and the first port number as a destination port; and
a second egress firewall rule to apply to packets with the third pod as a source, the second pod as a destination, and the second port number as a destination port; and
configuring a firewall with the first egress firewall rule and the second egress firewall rule.
16. The non-transitory computer-readable medium ofclaim 15, wherein:
for a fourth pod, the manifest defines the first environment value for an environment of the fourth pod, the first port number for a fourth container of the fourth pod, and the name for the first port number defined for the fourth container of the fourth pod; and
the first egress firewall rule is further defined to apply to packets with the fourth pod as a destination.
17. The non-transitory computer-readable medium ofclaim 15, wherein configuring the firewall comprises configuring a virtual switch in a communication path of at least one of the first pod, the second pod, or the third pod.
18. The non-transitory computer-readable medium ofclaim 15, wherein:
for the third pod, the manifest defines a second environment value for an environment of the third pod, the second port number for a third container of the third pod, and the name for the second port number defined for the third container of the third pod;
the security policy defines a first ingress policy indicating the first environment value and the name, and further comprising:
creating, based on the first ingress policy, a first ingress firewall rule to apply to packets with the first pod as a source, the third pod as a destination, and the second port number as a destination port, wherein the first ingress firewall rule is further configured to apply to packets with the second pod as a source, the third pod as a destination, and the second port number as a destination port.
19. The non-transitory computer-readable medium ofclaim 18, wherein the security policy is further applied to a fourth pod, wherein, for the fourth pod, the manifest defines the second environment value for the environment of the fourth pod, a third port number for a fourth container of the fourth pod, and the name for the third port number defined for the fourth container of the fourth pod, and further comprising:
creating, based on the first ingress policy, a second ingress firewall rule to apply to packets with the first pod as a source, the fourth pod as a destination, and the third port number as a destination port, wherein the second ingress firewall rule is further configured to apply to packets with the second pod as a source, the fourth pod as a destination, and the third port number as a destination port.
20. The non-transitory computer-readable medium ofclaim 15, wherein the first pod is running in a first virtual machine.
US18/099,7102023-01-20Techniques for applying a named port security policyActive2043-12-14US12445413B2 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
CN20221358242022-12-01
WOPCT/CN2022/1358242022-12-01

Publications (2)

Publication NumberPublication Date
US20240187378A1true US20240187378A1 (en)2024-06-06
US12445413B2 US12445413B2 (en)2025-10-14

Family

ID=

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200218798A1 (en)*2019-01-032020-07-09NeuVector, Inc.Automatic deployment of application security policy using application manifest and dynamic process analysis in a containerization environment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20200218798A1 (en)*2019-01-032020-07-09NeuVector, Inc.Automatic deployment of application security policy using application manifest and dynamic process analysis in a containerization environment

Similar Documents

PublicationPublication DateTitle
US10880216B2 (en)Generic communication channel for information exchange between a hypervisor and a virtual machine
US10680946B2 (en)Adding multi-tenant awareness to a network packet processing device on a software defined network (SDN)
US20210058327A1 (en)Configuring service load balancers with specified backend virtual networks
US9584477B2 (en)Packet processing in a multi-tenant software defined network (SDN)
CN115733782A (en) Dual userspace-kernel space datapaths for packet processing operations
US11671358B2 (en)Disambiguating traffic in networking environments with multiple virtual routing and forwarding (VRF) logical routers
US11895030B2 (en)Scalable overlay multicast routing
US11570097B1 (en)Overlay broadcast network for management traffic
US11012357B2 (en)Using a route server to distribute group address associations
EP4471594A1 (en)Multiple connectivity modes for containerized workloads in a multi-tenant network
US12052185B2 (en)Software-defined network recommendation
US10397055B2 (en)Priority based scheduling in network controller using graph theoretic method
US11936546B1 (en)Live traffic tracing for pods in a network
US12438842B2 (en)High-availability egress access with consistent source IP addresses for workloads
US20250030663A1 (en)Secure service access with multi-cluster network policy
WO2025000179A1 (en)Creation of namespace-scoped virtual private clouds for containerized workloads in a multi-tenant network
US12445413B2 (en)Techniques for applying a named port security policy
US20240187378A1 (en)Techniques for applying a named port security policy
US12401625B2 (en)Cross cluster connectivity
EP4465607A1 (en)High-availability egress access with consistent source ip addresses for workloads
US12407591B2 (en)Centralized monitoring of containerized workloads in a multi-tenant, multi-cloud environment
US20240231871A9 (en)Sub-transport node profile configurations for a cluster of hosts
US20250028549A1 (en)Security orchestration for on-premises infrastructure
US20240243942A1 (en)Multicast group membership control for a container environment
US12413527B2 (en)Offloading network address translation and firewall rules to tier-1 routers for gateway optimization

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:VMWARE, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZHENG, XIE;REEL/FRAME:062442/0178

Effective date:20230119

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:VMWARE LLC, CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:VMWARE, INC.;REEL/FRAME:067355/0001

Effective date:20231121

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp